iPhone 5 Vulnerable to Pwn2Own Winning Exploit by Joost Pol and Daan Keuper

iPhone 5 Vulnerable to Pwn2Own Winning Exploit by Joost Pol and Daan Keuper

A motivated hacker could steal contacts, browsing history, photos and videos

Hackers Hijack iPhone 4S, Access Photos and Contacts at Pwn2Own

Hackers Hijack iPhone 4S, Access Photos and Contacts at Pwn2Own

$30,000 earned for what Joost Pol and Daan Keuper call “a clean hack”

Vupen Sells Exploits to Spy Agencies, They Pay Much More Than Google

Vupen Sells Exploits to Spy Agencies, They Pay Much More Than Google

Government agencies that want to snoop around pay 5 times Google's bounty, at least

Microsoft to Address the IE9 Issue Found in Pwn2Own Challenge (Video)

Microsoft to Address the IE9 Issue Found in Pwn2Own Challenge (Video)

If the vulnerability is exploited in the wild, the patching process will be accelerated

Chrome Flaws Identified by “Pinkie Pie” in Pwnium Challenge Fixed

Chrome Flaws Identified by “Pinkie Pie” in Pwnium Challenge Fixed

The researcher was awarded $60,000 (45,000 EUR) for his findings

Pwn2Own: VUPEN Finds Zero-Day Flaws in Internet Explorer 9

Pwn2Own: VUPEN Finds Zero-Day Flaws in Internet Explorer 9

The experts say that IE 10 is not as easy to exploit

Experts Start Finding Vulnerabilities in Browser-Hacking Contests

Experts Start Finding Vulnerabilities in Browser-Hacking Contests

A Russian security experts cracked Chrome soon after the competition began

Google Puts $1 Million, €744,000 on the Line for Chrome Exploits, Ditches Pwn2Own

Google Puts $1 Million, €744,000 on the Line for Chrome Exploits, Ditches Pwn2Own

Google is offering its own prizes in parallel with the popular competition

  • Security
  • By Lucian Constantin
  • March 11th, 2011
Mac Hacker Charlie Miller Pwns the iPhone 4

Mac Hacker Charlie Miller Pwns the iPhone 4

  • Security
  • By Lucian Constantin
  • March 10th, 2011
Safari Pwned in Five Seconds at Pwn2Own

Safari Pwned in Five Seconds at Pwn2Own

 
Want more? Browse: